Article Details

Scrape Timestamp (UTC): 2025-11-13 13:05:01.329

Source: https://thehackernews.com/2025/11/fake-chrome-extension-safery-steals.html

Original Article Text

Click to Toggle View

Fake Chrome Extension "Safery" Steals Ethereum Wallet Seed Phrases Using Sui Blockchain. Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to exfiltrate users' seed phrases. The name of the extension is "Safery: Ethereum Wallet," with the threat actor describing it as a "secure wallet for managing Ethereum cryptocurrency with flexible settings." It was uploaded to the Chrome Web Store on September 29, 2025, and was updated as recently as November 12. It's still available for download as of writing. "Marketed as a simple, secure Ethereum (ETH) wallet, it contains a backdoor that exfiltrates seed phrases by encoding them into Sui addresses and broadcasting microtransactions from a threat actor-controlled Sui wallet," Socket security researcher Kirill Boychenko said. Specifically, the malware present within the browser add-on is designed to steal wallet mnemonic phrases by encoding them as fake Sui wallet addresses and then using micro-transactions to send 0.000001 SUI to those wallets from a hard-coded threat actor-controlled wallet. The end goal of the malware is to smuggle the seed phrase inside normal looking blockchain transactions without the need for setting up a command-and-control (C2) server to receive the information. Once the transactions are complete, the threat actor can decode the recipient addresses to reconstruct the original seed phrase and ultimately drain assets from it. "This extension steals wallet seed phrases by encoding them as fake Sui addresses and sending micro-transactions to them from an attacker-controlled wallet, allowing the attacker to monitor the blockchain, decode the addresses back to seed phrases, and drain victims' funds," Koi Security notes in an analysis. To counter the risk posed by the threat, users are advised to stick to trusted wallet extensions. Defenders are recommended to scan extensions for mnemonic encoders, synthetic address generators, and hard-coded seed phrases, as well as block those that write on the chain during wallet import or creation. "This technique lets threat actors switch chains and RPC endpoints with little effort, so detections that rely on domains, URLs, or specific extension IDs will miss it," Boychenko said. "Treat unexpected blockchain RPC calls from the browser as high signal, especially when the product claims to be single chain."

Daily Brief Summary

MALWARE // Malicious Chrome Extension "Safery" Targets Ethereum Wallet Seed Phrases

A Chrome extension named "Safery: Ethereum Wallet" has been identified as malicious, designed to steal Ethereum wallet seed phrases via the Sui blockchain.

The extension masquerades as a secure Ethereum wallet, but encodes seed phrases into Sui addresses, using microtransactions to exfiltrate data.

The malware avoids traditional command-and-control servers by embedding seed phrases in blockchain transactions, complicating detection.

Once transactions are executed, attackers decode the recipient addresses to reconstruct seed phrases and access victims' cryptocurrency assets.

Users are advised to use only trusted wallet extensions and to scrutinize extensions for mnemonic encoders and synthetic address generators.

Security teams should monitor for unexpected blockchain RPC calls and block extensions that write on the chain during wallet import or creation.

The extension was uploaded to the Chrome Web Store on September 29, 2025, and remains available, posing an ongoing risk to users.